US20230281297A1 - Recognition based multi-skill-multi-sensory passwords with dynamic identification of sensor combination based on end user skill - Google Patents
Recognition based multi-skill-multi-sensory passwords with dynamic identification of sensor combination based on end user skill Download PDFInfo
- Publication number
- US20230281297A1 US20230281297A1 US18/051,200 US202218051200A US2023281297A1 US 20230281297 A1 US20230281297 A1 US 20230281297A1 US 202218051200 A US202218051200 A US 202218051200A US 2023281297 A1 US2023281297 A1 US 2023281297A1
- Authority
- US
- United States
- Prior art keywords
- user
- category
- categories
- password
- sensory
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 claims abstract description 77
- 230000001953 sensory effect Effects 0.000 claims abstract description 42
- 230000015654 memory Effects 0.000 claims description 20
- 230000008569 process Effects 0.000 claims description 14
- 230000000007 visual effect Effects 0.000 claims description 9
- 230000007246 mechanism Effects 0.000 abstract description 17
- 238000013459 approach Methods 0.000 abstract description 8
- 238000010586 diagram Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 5
- 230000015572 biosynthetic process Effects 0.000 description 4
- 238000013507 mapping Methods 0.000 description 4
- 238000003786 synthesis reaction Methods 0.000 description 4
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000011160 research Methods 0.000 description 3
- 241000282414 Homo sapiens Species 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 230000002708 enhancing effect Effects 0.000 description 2
- 241000282412 Homo Species 0.000 description 1
- 230000001154 acute effect Effects 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 230000003466 anti-cipated effect Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000003930 cognitive ability Effects 0.000 description 1
- 230000001149 cognitive effect Effects 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000001771 impaired effect Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 230000001052 transient effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
Definitions
- the embodiments herein generally relate to field of authentication mechanisms and, more particularly, to a method and system for recognition based multi-skill-multi-sensory passwords with dynamic identification of sensor combination based on end user skill.
- Digital authentication mechanisms for device access become critical as digital devices are entry points for various applications across domains such as banking, travel booking, device linking to various important user accounts and so on.
- Device authentication has been a well-researched field, with considerable efforts in identifying and addressing challenges in device handling across different user types such as tech savvy users, visually impaired users, physically challenged users, less-literate users and the like.
- One aspect is password synthesis or password generation and other is the mechanism designed for password entry for authenticating the user.
- the password generation mechanism is expected to increase the attack space for a brute force attacker by enabling generation of strong passwords.
- user's skill and capability play a major role in making use of the strength provided by the password synthesis mechanism. This becomes further challenging when user is a less-literate user, also referred as Basic Emergent User (BEU), where his/her ability to attempt variations or combinations for password generation is limited.
- BEU Basic Emergent User
- CDS passwords are hard to synthesize for the BEU since a) text entry of CDS on mobile phones is hard and painful, b) CDS passwords from BEU are weak in security, c) CDS passwords have low usability for BEU, and d) sufficiently random CDS passwords cannot be indefinitely generated by the BEU since BEUs saturate in generations of passwords.
- a mechanism is required that assists the BEU to utilize the entire password space during password generation increasing his password entropy, which refers to the unpredictability or randomness of password, effectively making it difficult-to-guess by the brute force attacker.
- Embodiments of the present disclosure present technological improvements as solutions to one or more of the above-mentioned technical problems recognized by the inventors in conventional systems.
- a method for recognition based multi-skill-multi-sensory passwords includes generating a user profile for a user of a device using a task-based technique to determine skill and capability of the user for generating a password comprising a combination of a plurality of sensory categories, wherein the generating the user profile comprises: a)—assigning a grade among a plurality of predefined grades to the user for each of the plurality of sensory categories, wherein the grade indicates capability level of the user associated with each category, b)—identifying one or more categories from among the plurality of sensory categories with an assigned grade above a grade threshold; c)—arranging the identified one or more categories in descending order of the assigned grade; d)—determining user preferences, to derive a user content probability, associated with each category among the plurality of sensory categories; e)—prompting the user to provide a security preference level and a privacy setting for an end application for which the password is to be generated; f)—determining a
- the method includes selecting a unique combination of the identified one or more categories, wherein the unique combination specifies number of inputs of each of the identified one or more categories required in the password, wherein the unique combination is selected from an entropy matching tree generated using varying combinations of inputs from each category, wherein an aggregated category entropy of the selected unique combination of the identified one or more categories is greater than or equal to the initial entropy.
- the method includes displaying to the user via a customized layout generation a plurality of options one by one from each category based on maximum options identified on the device for each category based on the user preferences determined for each category, wherein the sequence of categories displayed follows the descending order of the assigned grade.
- the method includes generating the customized layout for authentication process, offering the user to recognize an entry in each iteration from among the plurality of options presented from each category among the one or more identified categories present in the generated password, wherein the selection is recognition based; and authenticating the user if the recognized and selected input in each iteration matches the generated the password, wherein the matching is independently performed irrespective of the sequence of the selected input.
- a system for recognition based multi-skill-multi-sensory passwords comprises a memory storing instructions, one or more Input/Output (I/O) interfaces, and one or more hardware processors coupled to the memory via the one or more I/O interfaces, wherein the one or more hardware processors are configured by the instructions to generate a user profile for a user of a device using a task-based technique to determine skill and capability of the user for generating a password comprising a combination of a plurality of sensory categories, wherein the generating the user profile comprises: a)—assigning a grade among a plurality of predefined grades to the user for each of the plurality of sensory categories, wherein the grade indicates capability level of the user associated with each category, b)—identifying one or more categories from among the plurality of sensory categories with an assigned grade above a grade threshold; c)—arranging the identified one or more categories in descending order of the assigned grade; d)—determining user preferences, to derive a user
- the system is configured to select a unique combination of the identified one or more categories, wherein the unique combination specifies number of inputs of each of the identified one or more categories required in the password, wherein the unique combination is selected from an entropy matching tree generated using varying combinations of inputs from each category, wherein an aggregated category entropy of the selected unique combination of the identified one or more categories is greater than or equal to the initial entropy.
- the method includes displaying to the user via a customized layout generation a plurality of options one by one from each category based on maximum options identified on the device for each category based on the user preferences determined for each category, wherein the sequence of categories displayed follows the descending order of the assigned grade.
- the system is configured to generate the customized layout for authentication process, offering the user to recognize an entry in each iteration from among the plurality of options presented from each category among the one or more identified categories present in the generated password, wherein the selection is recognition based; and authenticating the user if the recognized and selected input in each iteration matches the generated the password, wherein the matching is independently performed irrespective of the sequence of the selected input.
- one or more non-transitory machine-readable information storage mediums comprising one or more instructions, which when executed by one or more hardware processors causes a method for recognition based multi-skill-multi-sensory passwords.
- the method includes
- the method includes generating a user profile for a user of a device using a task-based technique to determine skill and capability of the user for generating a password comprising a combination of a plurality of sensory categories, wherein the generating the user profile comprises: a)—assigning a grade among a plurality of predefined grades to the user for each of the plurality of sensory categories, wherein the grade indicates capability level of the user associated with each category, b)—identifying one or more categories from among the plurality of sensory categories with an assigned grade above a grade threshold; c)—arranging the identified one or more categories in descending order of the assigned grade; d)—determining user preferences, to derive a user content probability, associated with each category among the plurality of sensory categories; e)—prompting the user to provide a security preference level and a privacy setting for an end application for which the password is to be generated; f)—determining a password length based on the security preference level and the privacy setting provided by the user, wherein the password length specifies number of
- the method includes selecting a unique combination of the identified one or more categories, wherein the unique combination specifies number of inputs of each of the identified one or more categories required in the password, wherein the unique combination is selected from an entropy matching tree generated using varying combinations of inputs from each category, wherein an aggregated category entropy of the selected unique combination of the identified one or more categories is greater than or equal to the initial entropy.
- the method includes displaying to the user via a customized layout generation a plurality of options one by one from each category based on maximum options identified on the device for each category based on the user preferences determined for each category, wherein the sequence of categories displayed follows the descending order of the assigned grade.
- the method includes generating the customized layout for authentication process, offering the user to recognize an entry in each iteration from among the plurality of options presented from each category among the one or more identified categories present in the generated password, wherein the selection is recognition based; and authenticating the user if the recognized and selected input in each iteration matches the generated the password, wherein the matching is independently performed irrespective of the sequence of the selected input.
- FIG. 1 is a functional block diagram of a system, for recognition based multi-skill-multi-sensory passwords, in accordance with some embodiments of the present disclosure.
- FIG. 2 is a flow diagram illustrating a method for recognition based multi-skill-multi-sensory passwords, using the system of FIG. 1 , in accordance with some embodiments of the present disclosure.
- FIGS. 3 A and 3 B depict user profile generation for a multi-skill-multi-sensory password, in accordance with some embodiments of the present disclosure.
- FIG. 4 depicts generation of an entropy matching tree, in accordance with some embodiments of the present disclosure.
- FIG. 5 depicts balancing of the entropy matching tree, in accordance with some embodiments of the present disclosure.
- FIG. 6 depicts selection of a unique combination of the plurality of sensory categories from the balanced entropy matching tree, in accordance with some embodiments of the present disclosure.
- the challenge of generating password is about generating entropy by humans.
- the aids for generating entropy are digits and English alphabets.
- BEUs Basic Emergent Users
- the other challenge is that generating set for digits is 0-9, that is only ten symbols, and the pool to generate is also limited due to the entire spectrum of space available, and thereafter the conceptual modelling by BEU.
- passwords generated by the BEU are weaker and easy to guess.
- password length is normally 4 digits or 6 digits for most of the transactions.
- the English alphabet has a larger pool of symbols, specifically A-Z with 26 characters. Additionally with upper case and lower case, it becomes 2 ⁇ 26 that is 52. Special characters and digits are further included to increase the pool.
- the entropy generation is limited and hampered, primarily because of the language skills of the user, their cognitive abilities in the context of a foreign language and ability to conceptually model the concept of a password as understood/represent from the computer point of view. and the size of keyboard on the phone.
- the alphabet set ‘a-z’ is provided to a user, irrespective of any type of user, the user does not generate random sequence of alphabets but tend to generate words.
- the unit is not a character but a word and the ability to generate unique passwords is co-related to the ability to generate words at the unit level.
- the BEU has a limited foreign language, for example ‘English’ vocabulary that is widely used for authentication, which further reduces the ability to generate words.
- BEUs are limited to using their names, common words/nouns, which effectively it does not exceed a few tens of words.
- BEU due to the inherent cognitive and language skills of the BEU, the ability to generate passwords with good entropy is severely limited and prone to compromise.
- the other challenge for BEU is text entry on the smartphone.
- the layout of the keyboard and switching between alphabets, digits and symbols reduces the speed at which BEU can enter the password.
- the text entry of a password on a smartphone is susceptible to shoulder surfing.
- the other challenge with respect to the BEU is password interference. This is due to the BEU's limited ability to generate unique passwords when the BEU is faced with multiple password creations for multiple applications. It is observed that the BEU, (interchangeably referred to as user or end user) on an average if has 15 plus applications, tends to confuse password used for one application with another, with assumption that the password is unique for each. Practically, since the BEU cannot generate 15 unique passwords and keep changing them every month, it results in password reuse.
- the BEU tends to keep the same password for all the apps. As well understood, this is one of the most insecure approaches, since knowing one password compromises all passwords and corresponding applications. Apart from this, the ability to generate unique passwords infinitely or over longer or larger cycles, by adhering to the standard constraints of not using the last ten or twenty passwords, is additional challenge for the BEU. Thus, considering the BEU as an entropy generating machine with the input token limited to either digits or English language symbols or computer symbols in a smartphone, is severely constrained and restricted, thereby making them vulnerable to attacks such as brute force or man in middle attacks.
- Embodiments herein provide a method and system for recognition based multi-skill-multi-sensory passwords with dynamic identification of sensor combination based on end user skill, specifically for a Basic Emergent User (BEU), who is a less-literate user.
- BEU Basic Emergent User
- the method disclosed generates a user profile using a task-based technique to determine skill and capability of the end user associated with each of a plurality of sensory categories used for generating a multi-skill-multi-sensory password, hereinafter referred as password.
- Each of the plurality of sensory categories are graded is descending order based on user's skill and capability and user is dynamically offered to select each password entry from a particular sensor category in accordance with the identified grade in each iteration.
- the entropy of password in the context of user is split among the plurality of sensor categories. Furthermore, recognition-based approach is used during user authentication instead of more challenging recall-based approach. Furthermore, a customized layout is generated by merging a user location probability referring to device screen hotspots and a user content probability obtained from user preferences that prompts user to bring in variety in selection of inputs in each category.
- the method disclosed offers strong password generation, which is easier for the BEU to synthesize and authenticate.
- FIGS. 1 through 6 where similar reference characters denote corresponding features consistently throughout the figures, there are shown preferred embodiments and these embodiments are described in the context of the following exemplary system and/or method.
- FIG. 1 is a functional block diagram of a system 100 for recognition based multi-skill-multi-sensory passwords, in accordance with some embodiments of the present disclosure.
- the system 100 includes a processor(s) 104 , communication interface device(s), alternatively referred as input/output (I/O) interface(s) 106 , and one or more data storage devices or a memory 102 operatively coupled to the processor(s) 104 .
- the system 100 with one or more hardware processors is configured to execute functions of one or more functional blocks of the system 100 .
- the processor(s) 104 can be one or more hardware processors 104 .
- the one or more hardware processors 104 can be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, and/or any devices that manipulate signals based on operational instructions.
- the one or more hardware processors 104 are configured to fetch and execute computer-readable instructions stored in the memory 102 .
- system 100 can be implemented in a variety of computing systems including laptop computers, notebooks, hand-held devices such as mobile phones, workstations, mainframe computers, servers, and the like, which require an authentication mechanism for access or access of specific end application of interest to the user.
- the I/O interface(s) 106 can include a variety of software and hardware interfaces, for example, a web interface, a graphical user interface (a Grid Display interface) to display the generated target images and the like and can facilitate multiple communications within a wide variety of networks N/W and protocol types, including wired networks, for example, LAN, cable, etc., and wireless networks, such as WLAN, cellular and the like.
- the I/O interface (s) 106 can include one or more ports for connecting to a number of external devices or to another server or devices.
- the memory 102 may include any computer-readable medium known in the art including, for example, volatile memory, such as static random access memory (SRAM) and dynamic random access memory (DRAM), and/or non-volatile memory, such as read only memory (ROM), erasable programmable ROM, flash memories, hard disks, optical disks, and magnetic tapes.
- volatile memory such as static random access memory (SRAM) and dynamic random access memory (DRAM)
- DRAM dynamic random access memory
- non-volatile memory such as read only memory (ROM), erasable programmable ROM, flash memories, hard disks, optical disks, and magnetic tapes.
- the memory 102 includes modules and sub-modules (not shown) that generate user profile of a user of a device, entropy matching trees, customized layouts and the like. Further, the memory 102 may comprise information pertaining to input(s)/output(s) of each step performed by the processor(s) 104 of the system 100 and methods of the present disclosure. Further, the memory 102 includes a database 108 that may store a plurality of tasks that the user is asked to perform to generate the user profile. In an embodiment, the database 108 may be external (not shown) to the system 100 and coupled to the system via the I/O interface 106 . Functions of the components of the system 100 are explained in conjunction with flow diagram of FIG. 2 .
- FIG. 2 is a flow diagram illustrating a method 200 for recognition based multi-skill-multi-sensory passwords, using the system of FIG. 1 , in accordance with some embodiments of the present disclosure.
- the system 100 comprises one or more data storage devices or the memory 102 operatively coupled to the processor(s) 104 and is configured to store instructions for execution of steps of the method 200 by the processor(s) or one or more hardware processors 104 .
- the steps of the method 200 of the present disclosure will now be explained with reference to the components or blocks of the system 100 as depicted in FIG. 1 and the steps of flow diagram as depicted in FIG. 2 .
- the method 200 is explained specifically in context of the BEU, with plurality of sensory categories offered by the system 100 (user's device) as video (V), audio (A) and haptic (H), as an illustrative example, and not to be construed as a limitation.
- the user can select one or more images from those that are made available to him from among a plurality of images stored on the device. Similarly, options are provided to the user for each category.
- the system can be customized to the skill and capability of any user type and can offer additional sensory categories, still being within the scope of the method disclosed.
- the one or more hardware processors 104 generate a user profile for a user of a device using a task-based technique to determine skill and capability of user for generating the password comprising a combination of the plurality of sensory categories.
- the user profile generation enables the system 100 to understand the skill and capability of the user of the device, herein the BEU, and accordingly assist the less literate user to synthesize a strong password with ease.
- the user profiling process extracts and stores the information related to the user's skill and capability, and the end application for which user intends to generate the password.
- the user profiling is further explained with an example in conjunction with FIGS. 3 A and 3 B (collectively referred as FIG. 3 ).
- the user profiling process comprises:
- Example tasks used during user profiling are explained.
- the BEU logs on, the BEU is presented a set of tasks to ascertain the skill and capability of the BEU in each category or channel.
- the BEU selects minimum 3 skills from this grid and not more than 5.
- the tasks subsequently presented to the BEU are then pertaining to those skills and/or arts as self-identified by the BEU.
- the tasks are as follows.
- Task one related to the video (V) category presents a Shade Card of a particular color such as Blue with labels in an adjacent column.
- the BEU is asked to map the label to different shades of the color.
- a particular BEU say an artist or painter, would be better able to do the mapping of the color than say a barber or a mason.
- task two related to the audio (A) category presents a set of audio chords/songs/composition of instruments and bird sounds are shown to the BEU and the BEU is asked to map it to a label.
- a BEU with acute sense of differentiation between voices/audio would be able to ascertain the different audio mapping.
- a musician or a folk singer is likely to perform better than a barber or a mason.
- a set of vibrations with varying frequency components is played with mapping provided (for the BEU to categorize).
- mapping for the BEU to categorize.
- a person for example who does ‘naadi pariksha’ (pulse testing) would be better able to differentiate between the different classes of haptic vibrations as compared to a barber or a mason.
- the BEU can be say graded on five levels of competency on each sensory category or sensory channel. That is in the ‘3 channel’ ⁇ ‘5 levels’ (dimension) space, every BEU can be placed. Any BEU whose mapping lies on the higher dimension of that channel would have a higher performance for that channel in terms of usability.
- the one or more hardware processors 104 select a unique combination of the identified one or more categories, specifying number of inputs of each category required in the password.
- the unique combination is selected from an entropy matching tree generated using varying combinations of inputs from each category.
- the selected unique combination is such that an aggregated category entropy of the selected unique combination of the identified one or more categories is greater than or equal to the initial entropy.
- the method splits the entropy generated by a single mode or choice such as Digits (0-9) into multiple sensory elements, for example, (visual, aural, haptic, count ⁇ 3) such that the entropy remains the same or increases but the usability necessarily increases by a delta.
- the system comprises of automatically (machine based) splitting the entropy and offering the user a choice based on the capabilities of the user (BEU), so that the user can choose what makes the user (BEU) most happy or comfortable is password selection, enhancing user experience. For example, as mentioned earlier, entropy for a 4-digit pin 4 ⁇ logBase2(10). Then this value can be the same for Exlog3. E is the length of the password per sensory channel.
- V can be arrived at either by having say 3 Photos and 1 Audio or 2 Photos and 2 Audio.
- 2(2P,2A) and (3P,1A) could be presented to the BEU and the BEU can choose what makes her/him the happiest.
- the system 100 uses Photos on the mobile phone of the user to increase the corpus available to photos for increasing or decreasing the entropy based on a fixed length. Similarly for Audio and Haptic sensing.
- FIG. 4 depicts generation of entropy matching tree.
- the user device system 100
- the user device has P photos, A audios and H haptic options.
- the maximum or aggregated entropy can be defined by equation below:
- the coefficients (a, b, c) are determined automatically, were a is the entropy offered by x ⁇ Visual (Photos) ⁇ , b is the entropy offered by y (Audio) and c is the entropy offered by z (Haptic).
- the values variables x, y, z in the equation 1, are varied from 0 to X, Y and Z respectively for each category while they satisfy equation 1. This generates a plurality of combinations of x photos, y audios and z haptic vibrations creating an entropy matching tree in accordance with E(VAH).
- Each combination (x,y,z) is unique and is a node in the entropy matching tree, referred to as Red-Black Tree (RBT).
- FIG. 5 depicts entropy balancing technique, which balances the RBT as per entropy of the unique combination at each node.
- the RBT is balanced at each node as per entropy of the password (initial entropy), wherein the initial entropy in the base or root node.
- a unique combination is selected, for which the E(VAH) or the aggregated entropy is greater than or equal to the initial entropy, E(password), identified during user profiling.
- the one or more hardware processors 104 one by one display to the end user, via a customized layout generation on the Grid Display interface, a plurality of options from each category based maximum options identified on the device for each category based on the user preferences determined for each category.
- the sequence of categories displayed follows the descending order of the assigned grade.
- the customized layout is generated by merging the user location probability and the user content probability obtained from generated user profile.
- the customized layout is designed to prompt the user to bring in variation in selection of content for inputs in each category.
- the system 100 ensures that it does not each time display user preferences at most probable device screen locations. This enables diverting the user to choose variations in the password inputs rather than selection a favorite type of image in each iteration, effectively enhancing the user's entropy, by reducing the predictability of selection. This further increases the attack space for the attacker.
- the one or more hardware processors 104 generate the customized layout for authentication process indicating the user to recognize an entry in each iteration from among the plurality of options presented from each category among the one or more identified categories present in the generated password.
- the selection is recognition based hence the BEU need not memorize and recall but just need to recognize form the displayed options, which is an easier task for him.
- the displayed images or audio clips in the corresponding category are customized selections, and further are displayed during authentication process such that the right option which is input for the password is not at general device screen hotspot locations, which adds further challenge in cracking the password when attempted by an attacker.
- the one or more hardware processors 104 authenticate the user if the recognized and selected input in each iteration matches the generated the password, wherein the matching is independently performed irrespective of the sequence of the selected entry. This reduces chances of small sequence error, which may otherwise cause challenge for BEU while going through the authentication process.
- the method and system disclosed herein combines multiple senses into one unified password (audio/visual/tactile etc. as one cohesive unit) and is efficient from usable security.
- the idea presented here uses BEU's (human) sensing ability to form a password.
- Such computer-readable storage means contain program-code means for implementation of one or more steps of the method, when the program runs on a server or mobile device or any suitable programmable device.
- the hardware device can be any kind of device which can be programmed including e.g., any kind of computer like a server or a personal computer, or the like, or any combination thereof.
- the device may also include means which could be e.g., hardware means like e.g., an application-specific integrated circuit (ASIC), a field-programmable gate array (FPGA), or a combination of hardware and software means, e.g., an ASIC and an FPGA, or at least one microprocessor and at least one memory with software processing components located therein.
- the means can include both hardware means, and software means.
- the method embodiments described herein could be implemented in hardware and software.
- the device may also include software means. Alternatively, the embodiments may be implemented on different hardware devices, e.g., using a plurality of CPUs.
- the embodiments herein can comprise hardware and software elements.
- the embodiments that are implemented in software include but are not limited to, firmware, resident software, microcode, etc.
- the functions performed by various components described herein may be implemented in other components or combinations of other components.
- a computer-usable or computer readable medium can be any apparatus that can comprise, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
- a computer-readable storage medium refers to any type of physical memory on which information or data readable by a processor may be stored.
- a computer-readable storage medium may store instructions for execution by one or more processors, including instructions for causing the processor(s) to perform steps or stages consistent with the embodiments described herein.
- the term “computer-readable medium” should be understood to include tangible items and exclude carrier waves and transient signals, i.e., be non-transitory. Examples include random access memory (RAM), read-only memory (ROM), volatile memory, nonvolatile memory, hard drives, CD ROMs, DVDs, flash drives, disks, and any other known physical storage media.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
State of the art authentication mechanisms have limitations when used by Basic Emergent User (BEU). Embodiments herein provide method and system for recognition based multi-skill-multi-sensory passwords with dynamic identification of sensor combination based on end user skill, specifically for the BEU. The method disclosed generates user profile using a task-based technique to determine skill and capability of the user associated with each of a plurality of sensory categories used for generating a multi-skill-multi-sensory password. Each of the plurality of sensory categories are graded is descending order based on user's skill and capability and user is offered to select each password entry from a particular sensor category in accordance with the identified grade in each iteration. Thus, the entropy of password generation in the context of user is split among the sensor categories. Furthermore, recognition-based out of sequence approach is used during user authentication instead of more challenging memorizing-based approach.
Description
- This U.S. patent application claims priority under 35 U.S.C. § 119 to: Indian Patent Application No. 202221011117, filed on 1 Mar. 2022. The entire contents of the aforementioned application are incorporated herein by reference.
- The embodiments herein generally relate to field of authentication mechanisms and, more particularly, to a method and system for recognition based multi-skill-multi-sensory passwords with dynamic identification of sensor combination based on end user skill.
- With the world moving towards complete digitization, digital devices are serving as digital assistants. Digital authentication mechanisms for device access become critical as digital devices are entry points for various applications across domains such as banking, travel booking, device linking to various important user accounts and so on. Device authentication has been a well-researched field, with considerable efforts in identifying and addressing challenges in device handling across different user types such as tech savvy users, visually impaired users, physically challenged users, less-literate users and the like. There are two aspects that need to be looked upon while building authentication mechanisms for digital devices. One aspect is password synthesis or password generation and other is the mechanism designed for password entry for authenticating the user.
- The password generation mechanism is expected to increase the attack space for a brute force attacker by enabling generation of strong passwords. However, user's skill and capability play a major role in making use of the strength provided by the password synthesis mechanism. This becomes further challenging when user is a less-literate user, also referred as Basic Emergent User (BEU), where his/her ability to attempt variations or combinations for password generation is limited. Commonly used Character Digit Symbol (CDS) passwords are hard to synthesize for the BEU since a) text entry of CDS on mobile phones is hard and painful, b) CDS passwords from BEU are weak in security, c) CDS passwords have low usability for BEU, and d) sufficiently random CDS passwords cannot be indefinitely generated by the BEU since BEUs saturate in generations of passwords. Thus, specifically for the BEUs a mechanism is required that assists the BEU to utilize the entire password space during password generation increasing his password entropy, which refers to the unpredictability or randomness of password, effectively making it difficult-to-guess by the brute force attacker.
- Furthermore, it can be noted that most of the password entry mechanisms that enable the user to authenticate himself totally rely on recall, where the user is required to memorize the password and the sequence of input. This approach is in general a challenge to any type of user since he/she must remember multiple passwords for multiple applications across multiple devices. Obviously, for the BEU, authentication mechanism that requires memorizing is further challenging.
- Attempts have been made to use various modalities such as video, audio, haptic and the like for authentication mechanisms. However, mostly the existing methods handle single modality and focus on modality aspect where the device or machine's ability to receive input is considered. The end user's capability with respect to different modalities is not considered nor is much work done to assist the user to improve his entropy, Thus, for a BEU, whose entropy is already poor, this aspect is critical. Furthermore, even though an authentication mechanism is developed considering a user type, existing methods provide standard approach across users of an identified user type. It's obvious and understood that each user may have different capability and skill while using specific modality and may not be comfortable with one or more modalities the device authentication mechanism provides. Each of the existing methods have their own limitations and challenges, specifically when it narrows down to BEUs. The reason being authentication mechanisms are mostly standard across users and not customized for BEUs. The area of usable security is still under active research and the current body of research is focused only on literate users.
- Thus, enhancements to build robust authentication mechanism, that are hard for an attacker to crack but are still easy and convenient for the BEU for password synthesis and authentication is an open research area.
- Embodiments of the present disclosure present technological improvements as solutions to one or more of the above-mentioned technical problems recognized by the inventors in conventional systems.
- For example, in one embodiment, a method for recognition based multi-skill-multi-sensory passwords is provided. The method includes generating a user profile for a user of a device using a task-based technique to determine skill and capability of the user for generating a password comprising a combination of a plurality of sensory categories, wherein the generating the user profile comprises: a)—assigning a grade among a plurality of predefined grades to the user for each of the plurality of sensory categories, wherein the grade indicates capability level of the user associated with each category, b)—identifying one or more categories from among the plurality of sensory categories with an assigned grade above a grade threshold; c)—arranging the identified one or more categories in descending order of the assigned grade; d)—determining user preferences, to derive a user content probability, associated with each category among the plurality of sensory categories; e)—prompting the user to provide a security preference level and a privacy setting for an end application for which the password is to be generated; f)—determining a password length based on the security preference level and the privacy setting provided by the user, wherein the password length specifies number of inputs required for the password; g)—determining an initial entropy of the user in accordance with the security preference level and the privacy setting provided by the user using a basic character and a digit set for the determined password length; and h)—determining a user location probability that identifies high probability locations on device screen that are frequently accessed by the user.
- Further, the method includes selecting a unique combination of the identified one or more categories, wherein the unique combination specifies number of inputs of each of the identified one or more categories required in the password, wherein the unique combination is selected from an entropy matching tree generated using varying combinations of inputs from each category, wherein an aggregated category entropy of the selected unique combination of the identified one or more categories is greater than or equal to the initial entropy. Furthermore, the method includes displaying to the user via a customized layout generation a plurality of options one by one from each category based on maximum options identified on the device for each category based on the user preferences determined for each category, wherein the sequence of categories displayed follows the descending order of the assigned grade.
- Furthermore, the method includes generating the customized layout for authentication process, offering the user to recognize an entry in each iteration from among the plurality of options presented from each category among the one or more identified categories present in the generated password, wherein the selection is recognition based; and authenticating the user if the recognized and selected input in each iteration matches the generated the password, wherein the matching is independently performed irrespective of the sequence of the selected input.
- In another aspect, a system for recognition based multi-skill-multi-sensory passwords is provided. The system comprises a memory storing instructions, one or more Input/Output (I/O) interfaces, and one or more hardware processors coupled to the memory via the one or more I/O interfaces, wherein the one or more hardware processors are configured by the instructions to generate a user profile for a user of a device using a task-based technique to determine skill and capability of the user for generating a password comprising a combination of a plurality of sensory categories, wherein the generating the user profile comprises: a)—assigning a grade among a plurality of predefined grades to the user for each of the plurality of sensory categories, wherein the grade indicates capability level of the user associated with each category, b)—identifying one or more categories from among the plurality of sensory categories with an assigned grade above a grade threshold; c)—arranging the identified one or more categories in descending order of the assigned grade; d)—determining user preferences, to derive a user content probability, associated with each category among the plurality of sensory categories; e)—prompting the user to provide a security preference level and a privacy setting for an end application for which the password is to be generated; f)—determining a password length based on the security preference level and the privacy setting provided by the user, wherein the password length specifies number of inputs required for the password; g)—determining an initial entropy of the user in accordance with the security preference level and the privacy setting provided by the user using a basic character and a digit set for the determined password length; and h)—determining a user location probability that identifies high probability locations on device screen that are frequently accessed by the user.
- Further, the system is configured to select a unique combination of the identified one or more categories, wherein the unique combination specifies number of inputs of each of the identified one or more categories required in the password, wherein the unique combination is selected from an entropy matching tree generated using varying combinations of inputs from each category, wherein an aggregated category entropy of the selected unique combination of the identified one or more categories is greater than or equal to the initial entropy. Furthermore, the method includes displaying to the user via a customized layout generation a plurality of options one by one from each category based on maximum options identified on the device for each category based on the user preferences determined for each category, wherein the sequence of categories displayed follows the descending order of the assigned grade.
- Furthermore, the system is configured to generate the customized layout for authentication process, offering the user to recognize an entry in each iteration from among the plurality of options presented from each category among the one or more identified categories present in the generated password, wherein the selection is recognition based; and authenticating the user if the recognized and selected input in each iteration matches the generated the password, wherein the matching is independently performed irrespective of the sequence of the selected input.
- In yet another aspect, there are provided one or more non-transitory machine-readable information storage mediums comprising one or more instructions, which when executed by one or more hardware processors causes a method for recognition based multi-skill-multi-sensory passwords. The method includes
- The method includes generating a user profile for a user of a device using a task-based technique to determine skill and capability of the user for generating a password comprising a combination of a plurality of sensory categories, wherein the generating the user profile comprises: a)—assigning a grade among a plurality of predefined grades to the user for each of the plurality of sensory categories, wherein the grade indicates capability level of the user associated with each category, b)—identifying one or more categories from among the plurality of sensory categories with an assigned grade above a grade threshold; c)—arranging the identified one or more categories in descending order of the assigned grade; d)—determining user preferences, to derive a user content probability, associated with each category among the plurality of sensory categories; e)—prompting the user to provide a security preference level and a privacy setting for an end application for which the password is to be generated; f)—determining a password length based on the security preference level and the privacy setting provided by the user, wherein the password length specifies number of inputs required for the password; g)—determining an initial entropy of the user in accordance with the security preference level and the privacy setting provided by the user using a basic character and a digit set for the determined password length; and h)—determining a user location probability that identifies high probability locations on device screen that are frequently accessed by the user.
- Further, the method includes selecting a unique combination of the identified one or more categories, wherein the unique combination specifies number of inputs of each of the identified one or more categories required in the password, wherein the unique combination is selected from an entropy matching tree generated using varying combinations of inputs from each category, wherein an aggregated category entropy of the selected unique combination of the identified one or more categories is greater than or equal to the initial entropy. Furthermore, the method includes displaying to the user via a customized layout generation a plurality of options one by one from each category based on maximum options identified on the device for each category based on the user preferences determined for each category, wherein the sequence of categories displayed follows the descending order of the assigned grade.
- Furthermore, the method includes generating the customized layout for authentication process, offering the user to recognize an entry in each iteration from among the plurality of options presented from each category among the one or more identified categories present in the generated password, wherein the selection is recognition based; and authenticating the user if the recognized and selected input in each iteration matches the generated the password, wherein the matching is independently performed irrespective of the sequence of the selected input.
- It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
- The accompanying drawings, which are incorporated in and constitute a part of this disclosure, illustrate exemplary embodiments and, together with the description, serve to explain the disclosed principles:
-
FIG. 1 is a functional block diagram of a system, for recognition based multi-skill-multi-sensory passwords, in accordance with some embodiments of the present disclosure. -
FIG. 2 is a flow diagram illustrating a method for recognition based multi-skill-multi-sensory passwords, using the system ofFIG. 1 , in accordance with some embodiments of the present disclosure. -
FIGS. 3A and 3B (collectively referred asFIG. 3 ) depict user profile generation for a multi-skill-multi-sensory password, in accordance with some embodiments of the present disclosure. -
FIG. 4 depicts generation of an entropy matching tree, in accordance with some embodiments of the present disclosure. -
FIG. 5 depicts balancing of the entropy matching tree, in accordance with some embodiments of the present disclosure. -
FIG. 6 depicts selection of a unique combination of the plurality of sensory categories from the balanced entropy matching tree, in accordance with some embodiments of the present disclosure. - It should be appreciated by those skilled in the art that any block diagrams herein represent conceptual views of illustrative systems and devices embodying the principles of the present subject matter. Similarly, it will be appreciated that any flow charts, flow diagrams, and the like represent various processes which may be substantially represented in computer readable medium and so executed by a computer or processor, whether or not such computer or processor is explicitly shown.
- Exemplary embodiments are described with reference to the accompanying drawings. In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. Wherever convenient, the same reference numbers are used throughout the drawings to refer to the same or like parts. While examples and features of disclosed principles are described herein, modifications, adaptations, and other implementations are possible without departing from the scope of the disclosed embodiments.
- The challenge of generating password is about generating entropy by humans. Now, contemporarily the aids for generating entropy are digits and English alphabets. However, as mentioned in the background section Basic Emergent Users (BEUs) have a challenge with this. They have limited ability to generate digit based good passwords, That is because their digit entropy is very poor since instead of the concept of ‘entropy’ they choose numbers which are recallable or contextually relevant to them (such as date of birth) and apart from this, instead of treating the numbers as a decimal display of random binary representations, they treat them as paired digit (couplets) in case of 4 or more digits passwords—thus a 4-digit password is treated as a pair of 2-digits such as 2022 the current year. Thus the ‘singular’ digit is now reduced to ‘pairs’ of digits—effectively halving the length of the password. So, passwords generated by the BEUs are very easy to crack. The other challenge is that generating set for digits is 0-9, that is only ten symbols, and the pool to generate is also limited due to the entire spectrum of space available, and thereafter the conceptual modelling by BEU. Hence the passwords generated by the BEU are weaker and easy to guess. For a fixed length of passwords, password length is normally 4 digits or 6 digits for most of the transactions. On the other hand, the English alphabet has a larger pool of symbols, specifically A-Z with 26 characters. Additionally with upper case and lower case, it becomes 2×26 that is 52. Special characters and digits are further included to increase the pool. However, despite this the entropy generation is limited and hampered, primarily because of the language skills of the user, their cognitive abilities in the context of a foreign language and ability to conceptually model the concept of a password as understood/represent from the computer point of view. and the size of keyboard on the phone. Further, it can be noted that, when the alphabet set ‘a-z’ is provided to a user, irrespective of any type of user, the user does not generate random sequence of alphabets but tend to generate words. Thus, the unit is not a character but a word and the ability to generate unique passwords is co-related to the ability to generate words at the unit level. The BEU has a limited foreign language, for example ‘English’ vocabulary that is widely used for authentication, which further reduces the ability to generate words. Rather, mostly BEUs are limited to using their names, common words/nouns, which effectively it does not exceed a few tens of words. Thus, due to the inherent cognitive and language skills of the BEU, the ability to generate passwords with good entropy is severely limited and prone to compromise.
- Apart from this, the other challenge for BEU is text entry on the smartphone. The layout of the keyboard and switching between alphabets, digits and symbols reduces the speed at which BEU can enter the password. Further to this, the text entry of a password on a smartphone is susceptible to shoulder surfing. The other challenge with respect to the BEU is password interference. This is due to the BEU's limited ability to generate unique passwords when the BEU is faced with multiple password creations for multiple applications. It is observed that the BEU, (interchangeably referred to as user or end user) on an average if has 15 plus applications, tends to confuse password used for one application with another, with assumption that the password is unique for each. Practically, since the BEU cannot generate 15 unique passwords and keep changing them every month, it results in password reuse. That is the BEU tends to keep the same password for all the apps. As well understood, this is one of the most insecure approaches, since knowing one password compromises all passwords and corresponding applications. Apart from this, the ability to generate unique passwords infinitely or over longer or larger cycles, by adhering to the standard constraints of not using the last ten or twenty passwords, is additional challenge for the BEU. Thus, considering the BEU as an entropy generating machine with the input token limited to either digits or English language symbols or computer symbols in a smartphone, is severely constrained and restricted, thereby making them vulnerable to attacks such as brute force or man in middle attacks. Furthermore, recall based authentication, wherein the BEU must memorize the passwords and thereafter rightly enter them in a predefined sequence during device or application (end utility) authentication, as discussed in the background section, is always a challenge. Thus, the above technical challenge remains unaddressed.
- Embodiments herein provide a method and system for recognition based multi-skill-multi-sensory passwords with dynamic identification of sensor combination based on end user skill, specifically for a Basic Emergent User (BEU), who is a less-literate user. The method disclosed generates a user profile using a task-based technique to determine skill and capability of the end user associated with each of a plurality of sensory categories used for generating a multi-skill-multi-sensory password, hereinafter referred as password. Each of the plurality of sensory categories are graded is descending order based on user's skill and capability and user is dynamically offered to select each password entry from a particular sensor category in accordance with the identified grade in each iteration. Thus, the entropy of password in the context of user is split among the plurality of sensor categories. Furthermore, recognition-based approach is used during user authentication instead of more challenging recall-based approach. Furthermore, a customized layout is generated by merging a user location probability referring to device screen hotspots and a user content probability obtained from user preferences that prompts user to bring in variety in selection of inputs in each category.
- Thus, even with skill and capability limitation of the BEU, the method disclosed offers strong password generation, which is easier for the BEU to synthesize and authenticate.
- Referring now to the drawings, and more particularly to
FIGS. 1 through 6 , where similar reference characters denote corresponding features consistently throughout the figures, there are shown preferred embodiments and these embodiments are described in the context of the following exemplary system and/or method. -
FIG. 1 is a functional block diagram of a system 100 for recognition based multi-skill-multi-sensory passwords, in accordance with some embodiments of the present disclosure. - In an embodiment, the system 100 includes a processor(s) 104, communication interface device(s), alternatively referred as input/output (I/O) interface(s) 106, and one or more data storage devices or a
memory 102 operatively coupled to the processor(s) 104. The system 100 with one or more hardware processors is configured to execute functions of one or more functional blocks of the system 100. - Referring to the components of system 100, in an embodiment, the processor(s) 104, can be one or
more hardware processors 104. In an embodiment, the one ormore hardware processors 104 can be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, and/or any devices that manipulate signals based on operational instructions. Among other capabilities, the one ormore hardware processors 104 are configured to fetch and execute computer-readable instructions stored in thememory 102. In an embodiment, the system 100 can be implemented in a variety of computing systems including laptop computers, notebooks, hand-held devices such as mobile phones, workstations, mainframe computers, servers, and the like, which require an authentication mechanism for access or access of specific end application of interest to the user. - The I/O interface(s) 106 can include a variety of software and hardware interfaces, for example, a web interface, a graphical user interface (a Grid Display interface) to display the generated target images and the like and can facilitate multiple communications within a wide variety of networks N/W and protocol types, including wired networks, for example, LAN, cable, etc., and wireless networks, such as WLAN, cellular and the like. In an embodiment, the I/O interface (s) 106 can include one or more ports for connecting to a number of external devices or to another server or devices.
- The
memory 102 may include any computer-readable medium known in the art including, for example, volatile memory, such as static random access memory (SRAM) and dynamic random access memory (DRAM), and/or non-volatile memory, such as read only memory (ROM), erasable programmable ROM, flash memories, hard disks, optical disks, and magnetic tapes. - Further, the
memory 102 includes modules and sub-modules (not shown) that generate user profile of a user of a device, entropy matching trees, customized layouts and the like. Further, thememory 102 may comprise information pertaining to input(s)/output(s) of each step performed by the processor(s) 104 of the system 100 and methods of the present disclosure. Further, thememory 102 includes adatabase 108 that may store a plurality of tasks that the user is asked to perform to generate the user profile. In an embodiment, thedatabase 108 may be external (not shown) to the system 100 and coupled to the system via the I/O interface 106. Functions of the components of the system 100 are explained in conjunction with flow diagram ofFIG. 2 . -
FIG. 2 is a flow diagram illustrating amethod 200 for recognition based multi-skill-multi-sensory passwords, using the system ofFIG. 1 , in accordance with some embodiments of the present disclosure. In an embodiment, the system 100 comprises one or more data storage devices or thememory 102 operatively coupled to the processor(s) 104 and is configured to store instructions for execution of steps of themethod 200 by the processor(s) or one ormore hardware processors 104. The steps of themethod 200 of the present disclosure will now be explained with reference to the components or blocks of the system 100 as depicted inFIG. 1 and the steps of flow diagram as depicted inFIG. 2 . Although process steps, method steps, techniques or the like may be described in a sequential order, such processes, methods, and techniques may be configured to work in alternate orders. In other words, any sequence or order of steps that may be described does not necessarily indicate a requirement that the steps to be performed in that order. The steps of processes described herein may be performed in any order practical. Further, some steps may be performed simultaneously. - The
method 200, is explained specifically in context of the BEU, with plurality of sensory categories offered by the system 100 (user's device) as video (V), audio (A) and haptic (H), as an illustrative example, and not to be construed as a limitation. The user can select one or more images from those that are made available to him from among a plurality of images stored on the device. Similarly, options are provided to the user for each category. However, it can be understood by a person with ordinary skill in the art that the system can be customized to the skill and capability of any user type and can offer additional sensory categories, still being within the scope of the method disclosed. - Referring to the steps of the
method 200, atstep 202 of themethod 200, the one ormore hardware processors 104 generate a user profile for a user of a device using a task-based technique to determine skill and capability of user for generating the password comprising a combination of the plurality of sensory categories. The user profile generation enables the system 100 to understand the skill and capability of the user of the device, herein the BEU, and accordingly assist the less literate user to synthesize a strong password with ease. - During user profile generation, also referred as user profiling, the user (BEU) is asked to undergo a plurality of tasks and may be asked to respond to a set of questionnaires. A user profiling process extracts and stores the information related to the user's skill and capability, and the end application for which user intends to generate the password. The user profiling is further explained with an example in conjunction with
FIGS. 3A and 3B (collectively referred asFIG. 3 ). The user profiling process comprises: -
- a) Assigning a grade among a plurality of predefined grades to the user for each of the plurality of sensory categories, wherein the grade indicates capability level of the user associated with each category. For example, as depicted in
FIG. 3 , the plurality of sensory categories include but are not limited to video, audio, haptic and olfactory. The user is made to undergo tasks from each category and the predefined grades such as highly capable, moderately capable and poor, are assigned to user. - b) Once the grades are assigned, one or more categories from among the plurality of categories with assigned grade above a grade threshold are identified. For example, if the user is assigned the grade as ‘poor’ in a specific category, there is no point in selecting that category as one of the sensory categories as mode of input during password generation or synthesis.
- c) The identified one or more categories, which are the highly capable, and the moderately capable are arranged in descending order of the assigned grade. This information extracted enables the system 100 to understand the categories user will be more comfortable with both during password generation and authentication.
- d) Further, in each category such as video, audio, haptic or olfactory, where user has demonstrated capability above the threshold, user may have his/her own preferences that are bound to affect his selection of images, audio, haptic. It is critical to extract this information, which is done by analyzing user's response to selection-based tasks. The analyzed information enables to identify user preferences. For example, when the user is asked to perform random image selection, from a displayed set of images from the ones available on the system 100, he/she may be naturally inclined to pick images of a favorite person, favorite location etc. The user preferences so extracted are used to derive a user content probability indicating probability that the user selects an image of A-type or B-type and so on. Thus, user content probability provides information on user's biases and/or preferences for certain content captured/represented within media types such as visual (image/video), aural, haptic. It can be understood that user content probability is very specific to the user and is captured by the system in the user profile, to later bring in customization the manner content of each category is displayed to user during password generation and authentication.
- e) Furthermore, for an end application of interest, for which the user intends to generate a password, the user is prompted to provide a security preference level and a privacy setting. The security preference level comprises high security, medium and low security, wherein the privacy setting can be set to ‘yes’ or ‘no’, as depicted in
FIG. 3B . In an embodiment, the BEU can be guided for identifying the security preference level and the privacy setting based on the end application, which is of interest to the user. For example, security preference levels for ‘banking’ or ‘payments’ apps are mapped to high, while security preference level for apps such as ‘search’ or ‘radio’ are mapped to low security, and others are mapped to either medium or high security based on the selection done by the BEU. So, a BEU might use messaging apps as medium to communicate and hence can set is as low security, while if used for payment might is set as high security. The privacy setting is mapped to either ‘0’ (publicly accessible) or ‘1’ (private—only for the BEU). - f) Once privacy setting and security preference level are obtained, then a password length based on the security preference level provided by the user is computed using well-known standard applications or software. For example, National Institute of Standards and Technology (US) provides services to get appropriate password lengths. The length of the password specifies number of inputs required for the password. For example, say the password length can be 4-character, 6-character and so on.
- g) Further, initial entropy of the user is determined by asking user to perform a task such as generating say, X, Y, Z or maximum unique passwords using basic character and digit set for the determined password length. The initial entropy is represented as E(password), which derived from the maximum password user could generate during the task. It can be noted as explained earlier, any user generally selects the password not based on each character, but a word that in his limited vocabulary. Thus, the unit is not a character but a word. This limits the entropy or randomness of user in generating unique/distinct passwords, as understood this randomness or entropy further drops when user is the BEU. Entropy of any password=E=Length of Password×LogBase2 NumberOfSymbols. So, for a 4-digit password, 4-Symbol Length (hence N=4) and 10 symbols (0-9) hence 4×logBase2(10) is the entropy offered by a DigitKeypad for a 4-digit password. However, the BEU is unable to use the entire entropy made available and able generate K unique passwords, effectively reducing his/her entropy to K.
- h) Finally, during the user profiling, a user location probability, on the Grid Display interface wherein the content is placed to be displayed to the user, is determined that identifies high probability locations on device screen that are frequently accessed by the user. The user location probability indicates hotspots on device screen, indication probability of user to select from a location coordinate (x,y) on the device screen thus providing information of user's preference for locations where content or media is displayed. Similarly, to the user content probability, the user location probability information is specific to user and is extracted by the system 100 using task-based approach. For example, user may be asked to select random numbers from displayed set, or random images from a displayed set. It can be noticed that based on user's physical handling of the device, user is bound to pick content at certain location (x1, y1), (x2, y2) more frequently than the odd locations say (x3, y3) or the like on screen. As well known, this is specifically related to way the user holds the device and the ease with which he/she can move his fingers across the locations on the device screen.
- a) Assigning a grade among a plurality of predefined grades to the user for each of the plurality of sensory categories, wherein the grade indicates capability level of the user associated with each category. For example, as depicted in
- Example tasks used during user profiling are explained. When the BEU logs on, the BEU is presented a set of tasks to ascertain the skill and capability of the BEU in each category or channel. Before execution of the tasks, the BEU self-identifies himself/herself to one of the n×m socio-culturally identified skills and/or arts, which for the Indian context are 8×8=64 and shown as grid with 8×8 with visual. The BEU selects minimum 3 skills from this grid and not more than 5. The tasks subsequently presented to the BEU are then pertaining to those skills and/or arts as self-identified by the BEU. The tasks are as follows. Task one related to the video (V) category presents a Shade Card of a particular color such as Blue with labels in an adjacent column. The BEU is asked to map the label to different shades of the color. A particular BEU, say an artist or painter, would be better able to do the mapping of the color than say a barber or a mason. Similarly, task two related to the audio (A) category presents a set of audio chords/songs/composition of instruments and bird sounds are shown to the BEU and the BEU is asked to map it to a label. In this case too, a BEU with acute sense of differentiation between voices/audio would be able to ascertain the different audio mapping. Thus, a musician or a folk singer is likely to perform better than a barber or a mason. Similarly for the third part related to the haptic (H) category, a set of vibrations with varying frequency components is played with mapping provided (for the BEU to categorize). Here too, a person for example who does ‘naadi pariksha’ (pulse testing) would be better able to differentiate between the different classes of haptic vibrations as compared to a barber or a mason. Thus, with these 3 examples of classification, the BEU can be say graded on five levels of competency on each sensory category or sensory channel. That is in the ‘3 channel’ב5 levels’ (dimension) space, every BEU can be placed. Any BEU whose mapping lies on the higher dimension of that channel would have a higher performance for that channel in terms of usability.
- Once the user profile is generated, at
step 204 of themethod 200, the one ormore hardware processors 104 select a unique combination of the identified one or more categories, specifying number of inputs of each category required in the password. The unique combination is selected from an entropy matching tree generated using varying combinations of inputs from each category. The selected unique combination is such that an aggregated category entropy of the selected unique combination of the identified one or more categories is greater than or equal to the initial entropy. - The method splits the entropy generated by a single mode or choice such as Digits (0-9) into multiple sensory elements, for example, (visual, aural, haptic, count −3) such that the entropy remains the same or increases but the usability necessarily increases by a delta. The system comprises of automatically (machine based) splitting the entropy and offering the user a choice based on the capabilities of the user (BEU), so that the user can choose what makes the user (BEU) most happy or comfortable is password selection, enhancing user experience. For example, as mentioned earlier, entropy for a 4-digit pin 4×logBase2(10). Then this value can be the same for Exlog3. E is the length of the password per sensory channel. So, V can be arrived at either by having say 3 Photos and 1 Audio or 2 Photos and 2 Audio. These choices of 2(2P,2A) and (3P,1A) could be presented to the BEU and the BEU can choose what makes her/him the happiest. The system 100 uses Photos on the mobile phone of the user to increase the corpus available to photos for increasing or decreasing the entropy based on a fixed length. Similarly for Audio and Haptic sensing.
-
FIG. 4 depicts generation of entropy matching tree. For example, say the user device (system 100) has P photos, A audios and H haptic options. Thus, the entropy indicating randomness in combination with available photo, audio and haptic selection (each category) with respect to device context is E(P), E(A) and E(H), wherein the aggregated entropy, also referred to as maximum entropy, offered by the device is, E(VAH)=E(P)+E(A)+E(H). However, from user profile it is identified that user is likely to select only X-photos, Y-audios and Z-haptic vibrations, as they are relevant to the user. Thus, the maximum or aggregated entropy can be defined by equation below: -
E(VAH)=E(P)+E(A)+E(H)=aX+by+cZ (1) - The coefficients (a, b, c) are determined automatically, were a is the entropy offered by x {Visual (Photos)}, b is the entropy offered by y (Audio) and c is the entropy offered by z (Haptic). The values variables x, y, z in the equation 1, are varied from 0 to X, Y and Z respectively for each category while they satisfy equation 1. This generates a plurality of combinations of x photos, y audios and z haptic vibrations creating an entropy matching tree in accordance with E(VAH). Each combination (x,y,z) is unique and is a node in the entropy matching tree, referred to as Red-Black Tree (RBT).
-
FIG. 5 , depicts entropy balancing technique, which balances the RBT as per entropy of the unique combination at each node. The RBT is balanced at each node as per entropy of the password (initial entropy), wherein the initial entropy in the base or root node. As depicted inFIG. 6 , from among these combinations of the balanced entropy matching tree, a unique combination is selected, for which the E(VAH) or the aggregated entropy is greater than or equal to the initial entropy, E(password), identified during user profiling. This ensures that the system 100 pushes the user's capability to improve his entropy while using the multi-sensory mechanism for password generation above the basic or initial entropy that user was capable of, when the basic digit/character-based mode of password generation was offered to the user. - At
step 206 of themethod 200, the one ormore hardware processors 104 one by one display to the end user, via a customized layout generation on the Grid Display interface, a plurality of options from each category based maximum options identified on the device for each category based on the user preferences determined for each category. The sequence of categories displayed follows the descending order of the assigned grade. The customized layout is generated by merging the user location probability and the user content probability obtained from generated user profile. The customized layout is designed to prompt the user to bring in variation in selection of content for inputs in each category. For example, say the user content probability for (V) category indicates user's inclination towards images having a photo of a specific personality, while the user location probability indicates user is inclined towards selecting options displayed on the Grid Display interface at top right and top left parts of screen, and is least inclined towards selection from bottom right location on the device screen, then, the system 100 ensures that it does not each time display user preferences at most probable device screen locations. This enables diverting the user to choose variations in the password inputs rather than selection a favorite type of image in each iteration, effectively enhancing the user's entropy, by reducing the predictability of selection. This further increases the attack space for the attacker. - Once the password is generated, which happens less frequently, the user is required to authenticate himself while using the end application. This happens more frequently. Thus, at
step 208 of themethod 200, the one ormore hardware processors 104 generate the customized layout for authentication process indicating the user to recognize an entry in each iteration from among the plurality of options presented from each category among the one or more identified categories present in the generated password. The selection is recognition based hence the BEU need not memorize and recall but just need to recognize form the displayed options, which is an easier task for him. However, since the displayed images or audio clips in the corresponding category are customized selections, and further are displayed during authentication process such that the right option which is input for the password is not at general device screen hotspot locations, which adds further challenge in cracking the password when attempted by an attacker. - At
step 210 of themethod 200, the one ormore hardware processors 104 authenticate the user if the recognized and selected input in each iteration matches the generated the password, wherein the matching is independently performed irrespective of the sequence of the selected entry. This reduces chances of small sequence error, which may otherwise cause challenge for BEU while going through the authentication process. - The written description describes the subject matter herein to enable any person skilled in the art to make and use the embodiments. The scope of the subject matter embodiments is defined by the claims and may include other modifications that occur to those skilled in the art. Such other modifications are intended to be within the scope of the claims if they have similar elements that do not differ from the literal language of the claims or if they include equivalent elements with insubstantial differences from the literal language of the claims.
- Thus, the method and system disclosed herein combines multiple senses into one unified password (audio/visual/tactile etc. as one cohesive unit) and is efficient from usable security. Existing passwords, use text/number/special symbols etc. The idea presented here uses BEU's (human) sensing ability to form a password. Hearing ability, visual ability and sensitivity to touch as a password component. The increase in usability from 1 channel (of only digits and characters) to multi-channel (multi-sensory space). So conventional passwords are one dimensional, whereas the method disclosed splits this into multi-dimensional space with standard password entropy
- It is to be understood that the scope of the protection is extended to such a program and in addition to a computer-readable means having a message therein; such computer-readable storage means contain program-code means for implementation of one or more steps of the method, when the program runs on a server or mobile device or any suitable programmable device. The hardware device can be any kind of device which can be programmed including e.g., any kind of computer like a server or a personal computer, or the like, or any combination thereof. The device may also include means which could be e.g., hardware means like e.g., an application-specific integrated circuit (ASIC), a field-programmable gate array (FPGA), or a combination of hardware and software means, e.g., an ASIC and an FPGA, or at least one microprocessor and at least one memory with software processing components located therein. Thus, the means can include both hardware means, and software means. The method embodiments described herein could be implemented in hardware and software. The device may also include software means. Alternatively, the embodiments may be implemented on different hardware devices, e.g., using a plurality of CPUs.
- The embodiments herein can comprise hardware and software elements. The embodiments that are implemented in software include but are not limited to, firmware, resident software, microcode, etc. The functions performed by various components described herein may be implemented in other components or combinations of other components. For the purposes of this description, a computer-usable or computer readable medium can be any apparatus that can comprise, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
- The illustrated steps are set out to explain the exemplary embodiments shown, and it should be anticipated that ongoing technological development will change the manner in which particular functions are performed. These examples are presented herein for purposes of illustration, and not limitation. Further, the boundaries of the functional building blocks have been arbitrarily defined herein for the convenience of the description. Alternative boundaries can be defined so long as the specified functions and relationships thereof are appropriately performed. Alternatives (including equivalents, extensions, variations, deviations, etc., of those described herein) will be apparent to persons skilled in the relevant art(s) based on the teachings contained herein. Such alternatives fall within the scope of the disclosed embodiments. Also, the words “comprising,” “having,” “containing,” and “including,” and other similar forms are intended to be equivalent in meaning and be open ended in that an item or items following any one of these words is not meant to be an exhaustive listing of such item or items or meant to be limited to only the listed item or items. It must also be noted that as used herein and in the appended claims, the singular forms “a,” “an,” and “the” include plural references unless the context clearly dictates otherwise.
- Furthermore, one or more computer-readable storage media may be utilized in implementing embodiments consistent with the present disclosure. A computer-readable storage medium refers to any type of physical memory on which information or data readable by a processor may be stored. Thus, a computer-readable storage medium may store instructions for execution by one or more processors, including instructions for causing the processor(s) to perform steps or stages consistent with the embodiments described herein. The term “computer-readable medium” should be understood to include tangible items and exclude carrier waves and transient signals, i.e., be non-transitory. Examples include random access memory (RAM), read-only memory (ROM), volatile memory, nonvolatile memory, hard drives, CD ROMs, DVDs, flash drives, disks, and any other known physical storage media.
- It is intended that the disclosure and examples be considered as exemplary only, with a true scope of disclosed embodiments being indicated by the following claims.
Claims (18)
1. A processor implemented method for recognition based multi-skill-multi-sensory passwords, the method further comprising:
generating, by one or more hardware processors, a user profile for a user of a device using a task-based technique to determine skill and capability of the user for generating a password further comprising a combination of a plurality of sensory categories, wherein the generating the user profile comprises:
a) assigning a grade among a plurality of predefined grades to the user for each of the plurality of sensory categories, wherein the grade indicates capability level of the user associated with each category;
b) identifying one or more categories from among the plurality of sensory categories with an assigned grade above a grade threshold;
c) arranging the identified one or more categories in descending order of the assigned grade;
d) determining user preferences, to derive a user content probability, associated with each category among the plurality of sensory categories;
e) prompting the user to provide a security preference level and a privacy setting for an end application for which the password is to be generated;
f) determining a password length based on the security preference level and the privacy setting provided by the user, wherein the password length specifies number of inputs required for the password;
g) determining an initial entropy of the user in accordance with the security preference level and the privacy setting provided by the user using a basic character and a digit set for the determined password length; and
h) determining a user location probability that identifies high probability locations on device screen that are frequently accessed by the user;
selecting, by the one or more hardware processors, a unique combination of the identified one or more categories, wherein the unique combination specifies number of inputs of each of the identified one or more categories required in the password, wherein the unique combination is selected from an entropy matching tree generated using varying combinations of inputs from each category, wherein an aggregated category entropy of the selected unique combination of the identified one or more categories is greater than or equal to the initial entropy; and
displaying, by the one or more hardware processors, to the user via a customized layout generation a plurality of options one by one from each category based maximum options identified on the device for each category based on the user preferences determined for each category, wherein the sequence of categories displayed follows the descending order of the assigned grade.
2. The method of claim 1 , the method further comprising:
generating, by the one or more hardware processors, the customized layout for authentication process, offering the user to recognize an entry in each iteration from among the plurality of options presented from each category among the one or more identified categories present in the generated password, wherein the selection is recognition based; and
authenticating, by the one or more hardware processors, the user if the recognized and selected input in each iteration matches the generated the password, wherein the matching is independently performed irrespective of the sequence of the selected input.
3. The method of claim 1 , wherein the customized layout is generated by merging the user location probability and the user content probability obtained from generated user profile, wherein the customized layout is designed to prompt the user to bring in variation in selection of content for inputs in each category.
4. The method of claim 1 , wherein the plurality of sensory categories comprises a visual category, an aural category, a haptic sensing category and an olfactory category.
5. The method of claim 1 , wherein the security preference level comprises high security, medium security and low security, and wherein the privacy setting is one of ‘yes’ and ‘no’.
6. The method of claim 1 , wherein the user is a Basic Emergent User (BEU).
7. A system for recognition based multi-skill-multi-sensory passwords, the system further comprising:
a memory storing instructions;
one or more Input/Output (I/O) interfaces; and
one or more hardware processors coupled to the memory via the one or more I/O interfaces , wherein the one or more hardware processors are configured by the instructions to:
generate a user profile for a user of a device using a task-based technique to determine skill and capability of the user for generating a password further comprising a combination of a plurality of sensory categories, wherein the generating the user profile comprises:
a) assigning a grade among a plurality of predefined grades to the user for each of the plurality of sensory categories, wherein the grade indicates capability level of the user associated with each category;
b) identifying one or more categories from among the plurality of sensory categories with an assigned grade above a grade threshold;
c) arranging the identified one or more categories in descending order of the assigned grade;
d) determining user preferences, to derive a user content probability, associated with each category among the plurality of sensory categories;
e) prompting the user to provide a security preference level and a privacy setting for an end application for which the password is to be generated;
f) determining a password length based on the security preference level and the privacy setting provided by the user, wherein the password length specifies number of inputs required for the password;
g) determining an initial entropy of the user in accordance with the security preference level and the privacy setting provided by the user using a basic character and a digit set for the determined password length; and
h) determining a user location probability that identifies high probability locations on device screen that are frequently accessed by the user;
select a unique combination of the identified one or more categories, wherein the unique combination specifies number of inputs of each of the identified one or more categories required in the password, wherein the unique combination is selected from an entropy matching tree generated using varying combinations of inputs from each category, wherein an aggregated category entropy of the selected unique combination of the identified one or more categories is greater than or equal to the initial entropy; and
display to the user via a customized layout generation a plurality of options one by one from each category based maximum options identified on the device for each category based on the user preferences determined for each category, wherein the sequence of categories displayed follows the descending order of the assigned grade.
8. The system of claim 7 , wherein the one or more hardware processors are further configured to:
generate the customized layout for authentication process, offering the user to recognize an entry in each iteration from among the plurality of options presented from each category among the one or more identified categories present in the generated password, wherein the selection is recognition based; and
authenticate the user if the recognized and selected input in each iteration matches the generated the password, wherein the matching is independently performed irrespective of the sequence of the selected input.
9. The system of claim 7 , wherein the customized layout is generated by merging the user location probability and the user content probability obtained from generated user profile, wherein the customized layout is designed to prompt the user to bring in variation in selection of content for inputs in each category.
10. The system of claim 7 , wherein the plurality of sensory categories comprises a visual category, an aural category, a haptic sensing category and an olfactory category.
11. The system of claim 7 , wherein the security preference level comprises high security, medium security and low security, and wherein the privacy setting is one of ‘yes’ and ‘no’.
12. The system of claim 7 , wherein the user is a Basic Emergent User (BEU).
13. One or more non-transitory machine-readable information storage mediums comprising one or more instructions which when executed by one or more hardware processors cause:
generating a user profile for a user of a device using a task-based technique to determine skill and capability of the user for generating a password further comprising a combination of a plurality of sensory categories, wherein the generating the user profile comprises:
a) assigning a grade among a plurality of predefined grades to the user for each of the plurality of sensory categories, wherein the grade indicates capability level of the user associated with each category;
b) identifying one or more categories from among the plurality of sensory categories with an assigned grade above a grade threshold;
c) arranging the identified one or more categories in descending order of the assigned grade;
d) determining user preferences, to derive a user content probability, associated with each category among the plurality of sensory categories;
e) prompting the user to provide a security preference level and a privacy setting for an end application for which the password is to be generated;
f) determining a password length based on the security preference level and the privacy setting provided by the user, wherein the password length specifies number of inputs required for the password;
g) determining an initial entropy of the user in accordance with the security preference level and the privacy setting provided by the user using a basic character and a digit set for the determined password length; and
h) determining a user location probability that identifies high probability locations on device screen that are frequently accessed by the user;
selecting a unique combination of the identified one or more categories, wherein the unique combination specifies number of inputs of each of the identified one or more categories required in the password, wherein the unique combination is selected from an entropy matching tree generated using varying combinations of inputs from each category, wherein an aggregated category entropy of the selected unique combination of the identified one or more categories is greater than or equal to the initial entropy; and
displaying to the user via a customized layout generation a plurality of options one by one from each category based maximum options identified on the device for each category based on the user preferences determined for each category, wherein the sequence of categories displayed follows the descending order of the assigned grade.
14. The one or more non-transitory machine-readable information storage mediums of claim 13 , wherein the one or more instructions which when executed by the one or more hardware processors further cause:
generating the customized layout for authentication process, offering the user to recognize an entry in each iteration from among the plurality of options presented from each category among the one or more identified categories present in the generated password, wherein the selection is recognition based; and
authenticating the user if the recognized and selected input in each iteration matches the generated the password, wherein the matching is independently performed irrespective of the sequence of the selected input.
15. The one or more non-transitory machine-readable information storage mediums of claim 13 , wherein the customized layout is generated by merging the user location probability and the user content probability obtained from generated user profile, wherein the customized layout is designed to prompt the user to bring in variation in selection of content for inputs in each category.
16. The one or more non-transitory machine-readable information storage mediums of claim 13 , wherein the plurality of sensory categories comprises a visual category, an aural category, a haptic sensing category and an olfactory category.
17. The one or more non-transitory machine-readable information storage mediums of claim 13 , wherein the security preference level comprises high security, medium security and low security, and wherein the privacy setting is one of ‘yes’ and ‘no’.
18. The one or more non-transitory machine-readable information storage mediums of claim 13 , wherein the user is a Basic Emergent User (BEU).
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IN202221011117 | 2022-03-01 | ||
IN202221011117 | 2022-03-01 |
Publications (1)
Publication Number | Publication Date |
---|---|
US20230281297A1 true US20230281297A1 (en) | 2023-09-07 |
Family
ID=84044660
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/051,200 Pending US20230281297A1 (en) | 2022-03-01 | 2022-10-31 | Recognition based multi-skill-multi-sensory passwords with dynamic identification of sensor combination based on end user skill |
Country Status (2)
Country | Link |
---|---|
US (1) | US20230281297A1 (en) |
EP (1) | EP4239505B1 (en) |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8639937B2 (en) * | 2003-11-26 | 2014-01-28 | Avaya Inc. | Method and apparatus for extracting authentication information from a user |
US8601589B2 (en) * | 2007-03-05 | 2013-12-03 | Microsoft Corporation | Simplified electronic messaging system |
US10423775B1 (en) * | 2014-06-05 | 2019-09-24 | Amazon Technologies, Inc. | Assisted password generation |
EP3528151A1 (en) * | 2018-02-15 | 2019-08-21 | Thomson Licensing | Method and apparatus for user authentication |
-
2022
- 2022-10-28 EP EP22204461.2A patent/EP4239505B1/en active Active
- 2022-10-31 US US18/051,200 patent/US20230281297A1/en active Pending
Also Published As
Publication number | Publication date |
---|---|
EP4239505C0 (en) | 2024-07-31 |
EP4239505B1 (en) | 2024-07-31 |
EP4239505A1 (en) | 2023-09-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10824760B2 (en) | Method for saving, sending and recollection of confidential user data | |
McDonald et al. | Use fewer instances of the letter “i”: Toward writing style anonymization | |
US8555353B2 (en) | Methods and apparatuses for controlling access to computer systems and for annotating media files | |
US20080172735A1 (en) | Alternative Key Pad Layout for Enhanced Security | |
WO2020159572A1 (en) | System and method for information extraction with character level features | |
US9596087B2 (en) | Token authentication for touch sensitive display devices | |
JP2007018087A (en) | Code generating device and method using biological information | |
CN107992545A (en) | A kind of searching method, device, terminal and readable storage medium storing program for executing | |
CN106878275A (en) | Auth method and device and server | |
JP2019534498A (en) | Verification method and apparatus | |
KR20210086836A (en) | Image data processing method for searching images by text | |
KR20200068775A (en) | Automated Smart Contract Tagging System based on Tag Recommendation Model | |
Thao et al. | Self-enhancing gps-based authentication using corresponding address | |
WO2022116827A1 (en) | Automatic delineation and extraction of tabular data in portable document format using graph neural networks | |
US20230281297A1 (en) | Recognition based multi-skill-multi-sensory passwords with dynamic identification of sensor combination based on end user skill | |
US11227122B1 (en) | Methods, mediums, and systems for representing a model in a memory of device | |
Noorjahan | A bio metric based approach for using captcha–to enhance accessibility for the visually impaired | |
Powell et al. | fgCAPTCHA: genetically optimized face image CAPTCHA 5 | |
Zujevs | Authentication by graphical passwords method ‘hope’ | |
CN107424604A (en) | The processing method and terminal of digital information in a kind of speech message | |
CN113868401A (en) | Digital human interaction method and device, electronic equipment and computer storage medium | |
JP4861265B2 (en) | Pattern definition generation program | |
KR102279359B1 (en) | Method and device for use selective non-identifying personal information | |
CN107426240A (en) | Auth method, device and server | |
CN110738031A (en) | Method, device and equipment for generating reading note |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |